1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
4 years ago
8

Which part of the os provides users and applications with an interface to manipulate files?

Computers and Technology
1 answer:
lora16 [44]4 years ago
6 0
I would think you're looking at the GUI, or, Graphical User Interface.

If it's manipulating files only, maybe your looking for the answer of the Filesystem.

I hope this doesn you some good.
You might be interested in
In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
Alexus [3.1K]
In ciphertext-only.

EXPLANATION: it is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. The attack is completely successful if the corresponding plaintexts can be extracted or, even better, the key.
3 0
3 years ago
What is the meaning of the title Two Kinds Of Stupid whose fault is it that Eduardo got in trouble
gizmo_the_mogwai [7]

Answer:Maybe that is inaropriate

Explanation:

Try rephrasing that

5 0
4 years ago
What controls can be found on the File tab of Microsoft PowerPoint? Check all that apply. Help Print Track Open Insert Save
Sophie [7]

Answer:

Help

Print

Open

Save

Explanation:

5 0
2 years ago
HELP PLZZZZZZ
Brums [2.3K]

Answer:

Do you want me the money for the policy that has been canceled

3 0
3 years ago
What is the value stored in the variable myNum after the following assignment statement executes? myNum = 23 % 5
netineya [11]

Answer:

% is a modulus operator in most languages, returning the remainder when the preceding number is divided by the following one .  Assuming the language this question pertains to is one of those, then the answer is 3.

7 0
3 years ago
Other questions:
  • Information Can Be Gathered Regarding The Temperature Of A Substance And Uploaded To A Computer Using A ___________ As A Data Co
    6·1 answer
  • A Network Management Station (NMS) is using SNMP to manage some Cisco routers and switches with SNMPv2c. Which of the following
    10·2 answers
  • While waiting to be seated at a restaurant, Jason receives a customer loyalty coupon through an app on his mobile phone for half
    7·1 answer
  • What is a preemptive CPU scheduling algorithm? Give an example and explain.
    7·1 answer
  • Can someone buy me eddie van der tabs???
    13·1 answer
  • List three ways security could be improved for taking the prepared deposit monies to the bank?​
    11·1 answer
  • When operating a forklift, what should you do to ensure a clear view and proper balance when traveling with a load?
    6·2 answers
  • Which of the two do you think is the most secure mode of communicating: sending a letter using the postal service or sending an
    9·1 answer
  • Differentiate between email and NIPOST System
    12·1 answer
  • To remove a specified number of characters from anywhere within a string, you should use the ____ method.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!